We found results for “”
CVE-2024-7646
Date: August 16, 2024
A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the "networking.k8s.io" or "extensions" API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.
Language: Go
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Input Validation
CWE-20CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


